Cargando…

Secure Edge-Based Energy Management Protocol in Smart Grid Environments with Correlation Analysis

For the monitoring and processing of network data, wireless systems are widely used in many industrial applications. With the assistance of wireless sensor networks (WSNs) and the Internet of Things (IoT), smart grids are being explored in many distributed communication systems. They collect data fr...

Descripción completa

Detalles Bibliográficos
Autores principales: Rehman, Amjad, Haseeb, Khalid, Jeon, Gwanggil, Bahaj, Saeed Ali
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9737205/
https://www.ncbi.nlm.nih.gov/pubmed/36501937
http://dx.doi.org/10.3390/s22239236
Descripción
Sumario:For the monitoring and processing of network data, wireless systems are widely used in many industrial applications. With the assistance of wireless sensor networks (WSNs) and the Internet of Things (IoT), smart grids are being explored in many distributed communication systems. They collect data from the surrounding environment and transmit it with the support of a multi-hop system. However, there is still a significant research gap in energy management for IoT devices and smart sensors. Many solutions have been proposed by researchers to cope with efficient routing schemes in smart grid applications. But, reducing energy holes and offering intelligent decisions for forwarding data are remain major problems. Moreover, the management of network traffic on grid nodes while balancing the communication overhead on the routing paths is an also demanding challenge. In this research work, we propose a secure edge-based energy management protocol for a smart grid environment with the support of multi-route management. It strengthens the ability to predict the data forwarding process and improves the management of IoT devices by utilizing a technique of correlation analysis. Moreover, the proposed protocol increases the system’s reliability and achieves security goals by employing lightweight authentication with sink coordination. To demonstrate the superiority of our proposed protocol over the chosen existing work, extensive experiments were performed on various network parameters.